You have Javascript disabled. While you will be able to browse this site without Javascript, some functionality on this site will not work without it. We strongly recommend enabling Javascript in your browser. This site uses cookies and collects data about visitor behavior for improving user experience, identifying returning visitors, and providing personalized offers. Your continued use of this site indicates your consent to this. See Privacy Policy for details or if you wish to disable cookies.

Your browser does not allow this site to store cookies and other data. Some functionality on this site may not work without them. See Privacy Policy for details on how we would use cookies.

This site uses cookies and collects data about visitor interaction for improving user experience, identifying returning visitors, and providing personalized offers. Your continued use of this site indicates your consent to this. See Privacy Policy for details or if you wish to disable cookies.

SSH Tectia ConnectSecure is designed to be installed and configured by an administrator, and the software operates transparent to the end users. The administrator can also define what the end users are allowed to do.

The Connection Broker handles all cryptographic operations and authentication-related tasks for SSH Tectia ConnectSecure. In addition, SSH Tectia ConnectSecure is configured through the Connection Broker settings made either in an XML file, or in the SSH Tectia Configuration GUI as described in SSH Tectia Connections Configuration GUI.